Posted on
in Presentations
Destructive ICS attacks generally require specialized skill and resources, but initial reconnaissance to plan an attack requires little advanced capabilities. Learn how defenders can decrease their attack surface and increase adversary friction by developing an awareness of ICS-specific open source intelligence (OSINT) techniques and the type of freely available data adversaries use in attacks.
Human Element Hackers & Threats Analytics Intelligence & Response
threat intelligence security awareness hackers & threats critical infrastructure
Topic
Human Element
Hackers & Threats
Analytics Intelligence & Response
Subtopic
threat intelligence
security awareness
hackers & threats
critical infrastructure
Share With Your Community